On July 23, 2024, Hitachi Energy released an advisory for vulnerabilities affecting its IED Connectivity Packages and PCM600 products. The vulnerabilities include cleartext storage of sensitive information, which could allow an attacker to access credentials, make unauthorized changes, or trigger denial-of-service conditions. The affected products are PCM600 versions prior to v2.11, various Connectivity Packages, and SAM600-IO, GMS600, and PWC600 packages. The issue primarily impacts these products by exposing sensitive data stored in cleartext format, making it vulnerable to unauthorized access and potential system compromise.
The cleartext storage vulnerability, identified as CVE-2022-2513, has been assigned a CVSS score of 7.1, indicating a significant risk. This vulnerability arises from improper handling of credentials in the PCM600 database and log files. Attackers with access to exported backup files or administrative privileges can exploit this flaw to gain control over Intelligent Electronic Devices (IEDs), leading to unauthorized modifications, reboots, or denial-of-service conditions. The vulnerability underscores the need for stringent security measures to protect sensitive information from unauthorized access.
To mitigate these risks, Hitachi Energy has recommended updating the PCM600 software to version 2.11 Hotfix 20240426. Additionally, users should reimport and export backup files to ensure they are free of the vulnerability. The advisory also emphasizes the importance of implementing robust security practices, such as applying the principle of least privilege, using firewalls, and ensuring process control systems are physically and network-segregated from external threats.
CISA has been informed of this vulnerability, and it is advised that organizations perform a thorough risk assessment and apply the recommended mitigations to minimize exploitation risks. For further details, Hitachi Energy’s cybersecurity advisory and additional mitigation guidance can be accessed on the CISA ICS webpage. No public exploits targeting this specific vulnerability have been reported, and it is not currently exploitable remotely.